Analysis

  • max time kernel
    177s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/12/2022, 19:51

General

  • Target

    c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065.exe

  • Size

    452KB

  • MD5

    52beba36bc5b371193ec2a93a7986bbf

  • SHA1

    47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

  • SHA256

    c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

  • SHA512

    86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

  • SSDEEP

    6144:K8XXRUw9Oz5+iUU03pej1YpTYzOb0kLXhlJFTaLTGu0yvHcr+JB8aULjPF:BnRy+ZyYpaCDJFuPyAHcqrUV

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 24 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 46 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065.exe
    "C:\Users\Admin\AppData\Local\Temp\c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3192
    • C:\Users\Admin\AppData\Local\Temp\xsglwjgvhcq.exe
      "C:\Users\Admin\AppData\Local\Temp\xsglwjgvhcq.exe" "c:\users\admin\appdata\local\temp\c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065.exe*"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Checks computer location settings
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2848
      • C:\Users\Admin\AppData\Local\Temp\psxdmq.exe
        "C:\Users\Admin\AppData\Local\Temp\psxdmq.exe" "-c:\users\admin\appdata\local\temp\c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • System policy modification
        PID:3048
      • C:\Users\Admin\AppData\Local\Temp\psxdmq.exe
        "C:\Users\Admin\AppData\Local\Temp\psxdmq.exe" "-c:\users\admin\appdata\local\temp\c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065.exe"
        3⤵
        • Modifies WinLogon for persistence
        • UAC bypass
        • Adds policy Run key to start application
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System policy modification
        PID:1116

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\bodtmakiyiggzjzr.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Users\Admin\AppData\Local\Temp\cskdzqdexklokxqlqng.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Users\Admin\AppData\Local\Temp\ewqljcrupehmkzuryxske.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Users\Admin\AppData\Local\Temp\iwmdxmxwnyxysdunq.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Users\Admin\AppData\Local\Temp\pgztqiwysgimjxrntrlc.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Users\Admin\AppData\Local\Temp\psxdmq.exe

          Filesize

          696KB

          MD5

          7bf458492f85aa2a2534a93274c8b1bb

          SHA1

          26866c2a00052092b468a2cbf21fb184b313c43c

          SHA256

          8cc55becc1601265aa3ecc33ee51d4a067e41c79995e52c61a6e13171627ef1e

          SHA512

          2825e9e9c375a4d118cafb9d26b9154f3d2f61eda37ca4021a7bd881682da455cd8f913c88ac0b7d4748e6d7fa66cf35dc7706d2be5b4b689e4be38bf1878819

        • C:\Users\Admin\AppData\Local\Temp\psxdmq.exe

          Filesize

          696KB

          MD5

          7bf458492f85aa2a2534a93274c8b1bb

          SHA1

          26866c2a00052092b468a2cbf21fb184b313c43c

          SHA256

          8cc55becc1601265aa3ecc33ee51d4a067e41c79995e52c61a6e13171627ef1e

          SHA512

          2825e9e9c375a4d118cafb9d26b9154f3d2f61eda37ca4021a7bd881682da455cd8f913c88ac0b7d4748e6d7fa66cf35dc7706d2be5b4b689e4be38bf1878819

        • C:\Users\Admin\AppData\Local\Temp\psxdmq.exe

          Filesize

          696KB

          MD5

          7bf458492f85aa2a2534a93274c8b1bb

          SHA1

          26866c2a00052092b468a2cbf21fb184b313c43c

          SHA256

          8cc55becc1601265aa3ecc33ee51d4a067e41c79995e52c61a6e13171627ef1e

          SHA512

          2825e9e9c375a4d118cafb9d26b9154f3d2f61eda37ca4021a7bd881682da455cd8f913c88ac0b7d4748e6d7fa66cf35dc7706d2be5b4b689e4be38bf1878819

        • C:\Users\Admin\AppData\Local\Temp\rgxpkammeqqsnzrlpl.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Users\Admin\AppData\Local\Temp\vojfeyosoeiondzxffbupl.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Users\Admin\AppData\Local\Temp\xsglwjgvhcq.exe

          Filesize

          308KB

          MD5

          85cb856b920e7b0b7b75115336fc2af2

          SHA1

          1d1a207efec2f5187583b652c35aef74ee4c473f

          SHA256

          6fff20aabe8265b6e811c9dbcb987f9c15cf07d1d8b80ced7b287d96900f5c62

          SHA512

          120ff9c77c19216e5691b6ba812f09f7db7b46685a391027fff56e5b73200f4211b6bac2c2d28cdfe461d1fbf10f1a3204adeedbd0a34a034a862c6278d901e8

        • C:\Users\Admin\AppData\Local\Temp\xsglwjgvhcq.exe

          Filesize

          308KB

          MD5

          85cb856b920e7b0b7b75115336fc2af2

          SHA1

          1d1a207efec2f5187583b652c35aef74ee4c473f

          SHA256

          6fff20aabe8265b6e811c9dbcb987f9c15cf07d1d8b80ced7b287d96900f5c62

          SHA512

          120ff9c77c19216e5691b6ba812f09f7db7b46685a391027fff56e5b73200f4211b6bac2c2d28cdfe461d1fbf10f1a3204adeedbd0a34a034a862c6278d901e8

        • C:\Windows\SysWOW64\bodtmakiyiggzjzr.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\SysWOW64\cskdzqdexklokxqlqng.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\SysWOW64\ewqljcrupehmkzuryxske.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\SysWOW64\iwmdxmxwnyxysdunq.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\SysWOW64\pgztqiwysgimjxrntrlc.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\SysWOW64\rgxpkammeqqsnzrlpl.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\SysWOW64\vojfeyosoeiondzxffbupl.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\bodtmakiyiggzjzr.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\bodtmakiyiggzjzr.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\cskdzqdexklokxqlqng.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\cskdzqdexklokxqlqng.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\ewqljcrupehmkzuryxske.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\ewqljcrupehmkzuryxske.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\iwmdxmxwnyxysdunq.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\iwmdxmxwnyxysdunq.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\pgztqiwysgimjxrntrlc.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\pgztqiwysgimjxrntrlc.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\rgxpkammeqqsnzrlpl.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\rgxpkammeqqsnzrlpl.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\vojfeyosoeiondzxffbupl.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d

        • C:\Windows\vojfeyosoeiondzxffbupl.exe

          Filesize

          452KB

          MD5

          52beba36bc5b371193ec2a93a7986bbf

          SHA1

          47329ebd38f5baa4a6d47d552ae9a0ddfcf64305

          SHA256

          c3f3c5ed5a1d415fbbdf313d10d031b130560c343740e2140716c675bb555065

          SHA512

          86977dca1444ff9c75562e16123ac74989cc375103fde83d7746068f70e772f5f2a432bd414a62e392257f1e277b6657dc18866d83a421e456472c2a57cd2e3d